Just some lists of Malware Configs
☆173Jan 9, 2025Updated last year
Alternatives and similar repositories for MalwareConfigLists
Users that are interested in MalwareConfigLists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆510Oct 7, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- A multi-threaded malware sample downloader based upon given MD-5/SHA-1/SHA-256 hashes, using multiple malware databases.☆30Apr 14, 2023Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically created C2 Feeds☆671Updated this week
- Collection of generic YARA rules☆16Mar 18, 2026Updated 3 weeks ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆69Jun 18, 2024Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆56Dec 5, 2024Updated last year
- ☆45Apr 6, 2026Updated last week
- This repository contains indicators of compromise (IOCs) of our various investigations.☆318Nov 4, 2025Updated 5 months ago
- ☆96Apr 8, 2026Updated last week
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This repo is about Active Directory Advanced Threat Hunting☆650Feb 17, 2025Updated last year
- Yara Rules for Modern Malware☆79Mar 3, 2024Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆936Mar 7, 2026Updated last month
- Welcome to the SEKOIA.IO Community repository!☆183Mar 30, 2026Updated 2 weeks ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Dec 28, 2022Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆283Aug 5, 2023Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆446Oct 26, 2022Updated 3 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,962Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆105Jul 11, 2024Updated last year
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 3 years ago
- ☆35Jan 13, 2026Updated 3 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆766Apr 6, 2026Updated last week
- ☆21Apr 19, 2024Updated last year
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆650Updated this week
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆32Mar 11, 2026Updated last month
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 4 months ago
- A honeypot for the Log4Shell vulnerability (CVE-2021-44228).☆93Nov 29, 2024Updated last year
- FLARE floss applied to all unpacked+dumped samples in Malpedia, pre-processed for further use.☆77Jan 6, 2026Updated 3 months ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,732Mar 21, 2026Updated 3 weeks ago
- Windows Local Privilege Escalation Cookbook☆1,300Feb 5, 2026Updated 2 months ago
- c2 traffic☆196Feb 6, 2023Updated 3 years ago